Patent classifications
H04L2209/46
PRIVACY PRESERVING MACHINE LEARNING FOR CONTENT DISTRIBUTION AND ANALYSIS
This disclosure relates to systems and techniques that can be implemented by content platforms to optimize (a) demographic-based digital component distribution used to categorize each user into a particular demographic so as to appropriately target that user for purposes of maximizing the efficacy of digital components shown to that user, and (b) demographic reporting used to report to digital component providers the effectiveness of the digital component.
DEVICE AND METHOD FOR PERFORMING STATISTICAL CALCULATION ON HOMOMORPHIC CIPHERTEXT
An electronic device is disclosed. The electronic device includes a memory configured to store at least one instruction, and store homomorphic ciphertexts storing a plurality of variable data in an encrypted state in plurality, and a processor configured to execute at least one instruction, and the processor is configured to generate, by executing the at least one instruction, number data corresponding to a variable combination by using a bin mask having different variable data classified for each of the homomorphic ciphertexts based on an operation instruction on the plurality of homomorphic ciphertexts being received.
EXECUTING AN ARITHMETIC CIRCUIT USING FULLY HOMOMORPHIC ENCRYPTION (FHE) AND MULTI-PARTY COMPUTATION (MPC)
Executing the operations of an arithmetic circuit by using a hybrid strategy that employs both fully homomorphic encryption (FHE) methods and multi-party computation (MPC) methods. In order to utilize this hybrid strategy, an arithmetic circuit is split into multiple partitions (at least two), and each partition is assigned to be executed using FHE methods or MPC methods. Finally, this hybrid strategy is utilized in a manner that automatically takes into account CPU and network utilization costs.
Systems and Methods in a Decentralized Network
In one embodiment, a method includes receiving a legal document associated with a party and classifying the legal document into one or more classifications. The method also includes obtaining a party decentralized identifier (DID) associated with the party. The method also includes generating a data model using the party DID and the one or more classifications. The method further includes generating a hybrid legal document using the data model.
Techniques for securing digital signatures using multi-party computation
Techniques for securing digital signatures using multi-party computation. A method includes generating at least one first secret share by a first system, wherein at least one second secret share is generated by one of at least one second system; signing data based on the at least one first secret share when a signing policy is met, wherein the signing is part of an interactive signing process including running a multi-party computation protocol by the first system and the at least one second system, wherein the signed data corresponds to a public key generated based on the plurality of secret shares, wherein the signing policy requires a minimum number of secret shares, wherein shares of one system alone are not sufficient to meet the signing policy, wherein no portion of shares of one system are revealed to the other system during the interactive signing process.
METHOD AND SYSTEM FOR PROVIDING ENCRYPTED DATA
A method for providing encrypted data on a client, a cloud or the like includes, providing, for each user, a user-specific encryption key for encrypting user-specific plaintext. A common decryption key is computed with a pre-determined f netion using the user-specific encryption keys as input for the function, The function is a polysized function supporting poly-many additions and a single multiplication. Each user-specific plaintext is encrypted with the corresponding user-specific encryption key resulting in user-specific ciphertexts, The encrypting is performed such that encryption is homomorphic in the user-specific plaintext as well in the user-specific encryption keys. A. common ciphertext is computed with the function using the user-specific ciphertexts as input for the function. The common ciphertext and the common decryption key are provided for decryption.
System, method, and computer program product for conducting private set intersection (PSI) techniques with multiple parties using a data repository
Provided are systems for conducting private set intersection (PSI) techniques with multiple parties using a data repository that include at least one processor to generate a data repository, receive, from a submission entity system associated with a submission entity, a private set intersection (PSI) data query that includes a match parameter for performing the PSI data query, transmit, to the submission entity system, a data classification encryption key, wherein the data classification encryption key is associated with a data field that corresponds to a match parameter data field of the match parameter, determine whether to authorize the PSI data query on the data repository, transmit, to the submission entity system, a data authorization encryption key based on determining to authorize the PSI data query on the data repository, and perform the PSI data query on the data repository. Methods and computer program products are also provided.
Privacy-preserving computing with third-party service
Systems, devices, and methods are provided for secure multiparty computation (MPC) protocols. A first computing entity may send a first cryptographically protected data set to a server and a second computing entity may send a second cryptographically protected data set to the server. The server may lack access to plaintext versions of the data sets. The server may compare cryptographically protected data elements from the first and second data sets as part of a secure MPC protocol to determine certain information regarding the data sets, such as determining which data elements are included in both sets, and perform homomorphic computations according to a homomorphic encryption scheme. The server is accordingly able to determine an encrypted result.
SYSTEMS AND METHODS FOR ENCRYPTING DATA AND ALGORITHMS
Systems, methods, and computer-readable media for achieving privacy for both data and an algorithm that operates on the data. A system can involve receiving an algorithm from an algorithm provider and receiving data from a data provider, dividing the algorithm into a first algorithm subset and a second algorithm subset and dividing the data into a first data subset and a second data subset, sending the first algorithm subset and the first data subset to the algorithm provider and sending the second algorithm subset and the second data subset to the data provider, receiving a first partial result from the algorithm provider based on the first algorithm subset and first data subset and receiving a second partial result from the data provider based on the second algorithm subset and the second data subset, and determining a combined result based on the first partial result and the second partial result.
SECURELY DETECTING ONLINE FRAUD MALWARE
A method for secure detection of online fraud. The method includes generating an encrypted profile representing browser activity, sending the encrypted profile to a secure multiparty computation system, receiving a trust token from the secure multiparty computation system, based on a determination that the web browser is not engaged in online fraud, sending a request to redeem the trust token with the secure multiparty computation system, receiving an encrypted record of redemption from the secure multiparty computation system based on a determination that a web site associated with the web content is not blocked, and sending a request, containing the encrypted record of redemption, for third-party content, wherein the third-party content is associated with the web content.